• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2021 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos
  • Gradebook

Question 2

August 25, 2021 by David Lanter 5 Comments

How you would apply the FIPS 199 security categorizations to decide if each of the information security risk mitigations (“safeguards”) described in the FGDC guidelines is needed?

Filed Under: Unit 02: Data Classification Process and Models Tagged With:

Reader Interactions

Comments

  1. Elizabeth Gutierrez says

    August 29, 2021 at 2:54 pm

    The Federal Information Processing Standards (FIPS 199) identifies three security categories known as the CIA triad being Confidentiality, Integrity, and Availability. Each category represents a potential impact on an organization or individual(s); the rankings or levels of potential impact are expressed as “low”, “moderate”, or “high”, and “non-applicable” only if considering information type. In other worlds, the generalized format expressing the security category of an information type is: SC information type = {(confidentiality, impact), (integrity, impact), (availability, impact)}. If the data needs to be safe-gauged, there are two options available based on the FGDC guidelines: changing or restricting the data. If I had to apply the FIPS 199 security categorizations to decide if each of the safeguards described in the FGDc guidelines are needed, I would first create a matrix to help me identify where my organization has a moderate or high potential impact keeping in mind the three security categories. I also found the decision tree to be very helpful in determining what steps to take next; I would follow the steps outlined by the decision tree based on my risk analysis on the CIA triad and impact levels.

    Log in to Reply
    • Shubham Patil says

      August 31, 2021 at 12:06 pm

      Risk mitigation can be done by considering the potential impact as low/moderate/high if the loss of CIA could be expected to have limited/serious/severe or catastrophic adverse effect on organizational operations, assets or individuals. FGDC stresses more the confidentiality aspect. It focuses more on safeguarding the sensitive data involved. In both cases, organizations are advised to ensure that they have the authority to safeguard the data.

      Log in to Reply
  2. Shubham Patil says

    August 29, 2021 at 3:52 pm

    The security categories are based on the potential impact on an organization should certain events occur which jeopardize the information and information systems needed by the organization to accomplish its assigned mission, protect its assets, fulfill its legal responsibilities, maintain its day-to-day functions, and protect individuals. Security categories are to be used in conjunction with vulnerability and threat information in assessing the risk to an organization.

    The characterization of information or an information system based on an assessment of the potential impact that a loss of confidentiality, integrity, or availability of such information or information system would have on organizational operations, organizational assets, or individuals.
    Federal Information Processing System (FIPS) Standards are developed to standardize data and processes among federal agencies. Their goal is to gain efficiency and economy through widespread use. These standards are generally mandated for use by federal agencies.

    The main purpose of FGDC standards are to reducing duplication, reducing the expense of data collection, and increasing the sharing of available data. Risk mitigation can be achieved by combining these two federal standard frameworks.

    References:

    https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.199.pdf

    Log in to Reply
    • Elizabeth Gutierrez says

      August 30, 2021 at 6:31 pm

      Hi Shubham,

      I also believe combining FIPS standards with the FGDC guidelines is the right move for security risk mitigations. Do you mind further evaluating how you would use / apply the resources? I also found a gap in the FGDC guidelines that is not addressed by this question. The FGDC guidelines are set up in a way that is only practical for organizations that already have procedures in place for handling sensitive information. Additionally, the guidelines take for granted that some organizations may not have executive and management officials to conduct the tasks recommended, fail to address necessary internal procedures, and how to financially support these decisions.

      Log in to Reply
  3. Alexander William Knoll says

    September 1, 2021 at 11:06 pm

    The FIPS 199 security categorizations are confidentiality, integrity, and availability. To determine if risk mitigations are necessary, one must look at the potential impact. If the impact is low, then safeguards may not be needed. If the impact is moderate or high, though, then safeguards should definitely be implemented.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (6)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in